This document describes how to verify the integrity of eCapture release artifacts.
Every eCapture release includes a SHA256SUMS file containing checksums for all release binaries.
# 1. Download the release binary and checksum file
RELEASE_VERSION="v2.0.1"
wget https://github.com/gojue/ecapture/releases/download/${RELEASE_VERSION}/ecapture-${RELEASE_VERSION}-linux-amd64.tar.gz
wget https://github.com/gojue/ecapture/releases/download/${RELEASE_VERSION}/SHA256SUMS
# 2. Verify the checksum
sha256sum -c SHA256SUMS --ignore-missingExpected output:
ecapture-v2.0.1-linux-amd64.tar.gz: OK
# Compute checksum of the downloaded file
sha256sum ecapture-${RELEASE_VERSION}-linux-amd64.tar.gz
# Compare with the value in SHA256SUMS
grep "ecapture-${RELEASE_VERSION}-linux-amd64.tar.gz" SHA256SUMS# Pull with digest verification
docker pull gojue/ecapture:latest
# Check the image digest
docker inspect --format='{{index .RepoDigests 0}}' gojue/ecapture:latestFor production environments, pin the Docker image to a specific digest instead of a mutable tag:
# Get the digest
docker inspect --format='{{index .RepoDigests 0}}' gojue/ecapture:latest
# Output: gojue/ecapture@sha256:<digest>
# Use the digest in your deployment
docker run --rm --privileged=true --net=host gojue/ecapture@sha256:<digest> tlsStatus: Planned for a future release
We are working on adopting Sigstore cosign for cryptographic signing of release artifacts. Once implemented, you will be able to verify releases as follows:
# Future: Verify with cosign
cosign verify-blob \
--signature ecapture-${RELEASE_VERSION}-linux-amd64.tar.gz.sig \
--certificate ecapture-${RELEASE_VERSION}-linux-amd64.tar.gz.cert \
ecapture-${RELEASE_VERSION}-linux-amd64.tar.gzStatus: Planned for a future release
We plan to leverage GitHub Artifact Attestations to provide SLSA provenance for all release builds. This will allow verification that artifacts were built in our CI/CD pipeline.
If you find a checksum mismatch or suspect that a release has been tampered with, please immediately report it via our security vulnerability reporting process.